General

  • Target

    2024-03-05_ce090e1d9b56fc4188ac74120c0732b7_cryptolocker

  • Size

    62KB

  • MD5

    ce090e1d9b56fc4188ac74120c0732b7

  • SHA1

    10b376af17c83631eaa22391f6ab16b85cf60fe0

  • SHA256

    0657b1ba67f5d024dc247cbb5831904458c48644e8d9631ee35a0cb5c3f1411d

  • SHA512

    95b6b3c9dbe1d4f4da4d4a5dc91019b5cd078d27bdea6078049a160b9a7c6c7936948e22ce541bbc76acf64501c33e01a2189f52652750f88c16c4a3c970382d

  • SSDEEP

    1536:qmbhXDmjr5MOtEvwDpj5cDtKkQZQRKb61vSbgtskPiK:BbdDmjr+OtEvwDpjM8Q

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-03-05_ce090e1d9b56fc4188ac74120c0732b7_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections